Details

Red Hat JBoss BRMS 6.0.2, which fixes multiple security issues, variousbugs, and adds enhancements, is now available from the Red Hat CustomerPortal.

The Red Hat Security Response Team has rated this update as havingImportant security impact. Common Vulnerability Scoring System (CVSS) basescores, which give detailed severity ratings, are available for eachvulnerability from the CVE links in the References section.

Red Hat JBoss BRMS is a business rules management system for themanagement, storage, creation, modification, and deployment of JBoss Rules.

This release of Red Hat JBoss BRMS 6.0.2 serves as a replacement for RedHat JBoss BRMS 6.0.1, and includes bug fixes and enhancements. Refer to theRed Hat JBoss BRMS 6.0.2 Release Notes for information on the mostsignificant of these changes. The Release Notes will be available shortlyat https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_BRMS/

The following security issues are fixed with this release:

It was found that the secure processing feature of Xalan-Java hadinsufficient restrictions defined for certain properties and features.A remote attacker able to provide Extensible Stylesheet LanguageTransformations (XSLT) content to be processed by an application usingXalan-Java could use this flaw to bypass the intended constraints of thesecure processing feature. Depending on the components available in theclasspath, this could lead to arbitrary remote code execution in thecontext of the application server running the application that usesXalan-Java. (CVE-2014-0107)

It was found that the ServerTrustManager in the Smack XMPP API did notverify basicConstraints and nameConstraints in X.509 certificate chains.A man-in-the-middle attacker could use this flaw to spoof servers andobtain sensitive information. (CVE-2014-0363)

It was found that the ParseRoster component in the Smack XMPP API did notverify the From attribute of a roster-query IQ stanza. A remote attackercould use this flaw to spoof IQ responses. (CVE-2014-0364)

A flaw was found in the WebSocket08FrameDecoder implementation that couldallow a remote attacker to trigger an Out Of Memory Exception by issuing aseries of TextWebSocketFrame and ContinuationWebSocketFrames. Depending onthe server configuration, this could lead to a denial of service.(CVE-2014-0193)

Red Hat would like to thank James Roper of Typesafe for reporting theCVE-2014-0193 issue.

All users of Red Hat JBoss BRMS 6.0.1 as provided from the Red Hat CustomerPortal are advised to upgrade to Red Hat JBoss BRMS 6.0.2.

Solution

The References section of this erratum contains a download link (you mustlog in to download the update). Before applying the update, back up yourexisting installation, including all applications, configuration files,databases and database settings, and so on.

It is recommended to halt the server by stopping the JBoss ApplicationServer process before installing this update, and then after installing theupdate, restart the server by starting the JBoss Application Serverprocess.